article thumbnail

Microsoft’s May 2023 Patch Tuesday Addresses 38 CVEs (CVE-2023-29336)

Tenable

Important CVE-2023-29336 | Win32k Elevation of Privilege Vulnerability CVE-2023-29336 is an EoP vulnerability in Microsoft’s Win32k, a core kernel-side driver used in Windows. Exploitation of this vulnerability would allow an attacker to gain SYSTEM level privileges on an affected host. This vulnerability received a CVSSv3 score of 7.8

Windows 97
article thumbnail

CVE-2022-37958: FAQ for Critical Microsoft SPNEGO NEGOEX Vulnerability

Tenable

CVE-2022-37958 is a remote code execution (RCE) vulnerability in the SPNEGO NEGOEX protocol of Windows operating systems, which supports authentication in applications. KB5017308: Windows 10 Version 20H2 / 21H1 / 21H2 Security Update (September 2022). KB5017328: Windows 11 Security Update (September 2022).

Windows 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Survey Results Highlight 3 Growth Areas for MSPs: Cybersecurity, Cloud and Automation

Kaseya

By identifying the needs of SMBs and providing them with the right IT services, MSPs can help them while also unlocking growth opportunities for themselves. The Kaseya 2022 IT Operations Survey Report provides MSPs with a window into the needs, goals and ambitions of internal IT teams. Why an SMB needs an MSP.

Survey 105
article thumbnail

Microsoft’s August 2022 Patch Tuesday Addresses 118 CVEs (CVE-2022-34713)

Tenable

Azure Real Time Operating System. Microsoft Windows Support Diagnostic Tool (MSDT). Role: Windows Fax Service. Role: Windows Hyper-V. System Center Operations Manager. Windows Bluetooth Service. Windows Canonical Display Driver. Windows Cloud Files Mini Filter Driver.

SMB 64
article thumbnail

Microsoft’s June 2022 Patch Tuesday Addresses 55 CVEs (CVE-2022-30190)

Tenable

Azure Real Time Operating System. Microsoft Windows ALPC. Microsoft Windows Codecs Library. Role: Windows Hyper-V. Windows Ancillary Function Driver for WinSock. Windows Ancillary Function Driver for WinSock. Windows App Store. Windows Autopilot. Windows Container Manager Service.

Windows 97
article thumbnail

WannaCry Ransomware Review and Global Impact.

ProtectWise

WannaCry's primary infection vector is through publicly accessible hosts running an unpatched version of Windows via the SMB protocol. WannaCry spreads primarily over SMB, but it can also use RDP. SMB, in particular, will then be used to send an exploit for the MS17-010 vulnerability. How Does WannaCry Infect a Host?

article thumbnail

Active Directory is Now in the Ransomware Crosshairs

Tenable

The joint CISA, FBI and NSA alert described the following: “According to a recently leaked threat actor “playbook,” Conti actors also exploit vulnerabilities in unpatched assets, such as the following, to escalate privileges and move laterally across a victim’s network: 2017 Microsoft Windows Server Message Block 1.0 BlackMatter .